Operationally Necessary Cookies
“‘Do what’s best for the job seeker.’ This has been Indeed’s guiding principle since the beginning. One way we put the job seeker first is by keeping their information safe and secure. We always consider the security of our systems as we develop the services that millions of people use every day. But someone will outsmart us. Hackers are always trying out new ways of bypassing security and gaining access to systems and information. Our challenge: to bring these security experts over to our side and benefit from their findings. Our answer to this challenge is, well, money. Actually, money and fame. Indeed offers security testers a legitimate route to reporting their findings, and we award them for their time with cold, hard cash and recognition. Through our bug bounty program we have awarded over 300 submissions in the past year and a half, with payouts as high as $5,000 for the most severe bugs. Our most successful participants (looking at you, Angrylogic, Avlidienbrunn, and Mongo) have earned cash while building their reputations as highly regarded testers for Indeed.”
Prior to our bug bounty program, we occasionally received messages that sounded like blackmail. An anonymous person would contact us, insisting that we pay them, or they would publicly release the details of an unspecified, but totally serious, security bug. These individuals expected payment up front, with no guarantee that they even had a bug to expose. While we’re happy to compensate researchers for helping us improve our services, we didn’t want to encourage this coercive behavior. It felt wrong.
To solve the mutual distrust, we started using Bugcrowd.com as an impartial arbiter. On Bugcrowd, security researchers are more willing to provide evidence up front, giving us the chance to fairly assess the bug’s severity. Indeed can now provide rewards without abuse, and everyone lives happily ever after…
Read the full blog post on Indeed’s Bug Bounty Program.
Empower Your Security Team With a Crowd of White Hat Hackers to Find and Fix Vulnerabilities in Your Code Before the Bad Guys Do.
From Our BlogOctober 14, 2021CrowdMatch: Auto-curated crowds for better, faster resultsOctober 1, 2021HEROES WANTED! Hack the Homeland for Challenge CoinsSeptember 27, 2021Bugcrowd Platform Behavior StandardsMORE BLOG POSTSNewsOctober 26, 2021Qualitest Joins Forces with Bugcrowd to Bolster Cybersecurity Offerings for Its Global Customer BaseAugust 16, 2021Audiomack Drives Down Risk with Public Bug Bounty on the Bugcrowd PlatformJuly 20, 2021Bugcrowd Awarded U.S. Patents for Crowd-Enabled Vulnerability DetectionMORE NEWSEventsMoney Talks GiveawayEnter submissions via the Bugcrowd platform, as you normally would. Our expert team of triagers…Connect With UsTips and Tricks to Penetration Testing: A Layered Security ApproachPen testing is widely known as a key security best practice. In fact, earlier this…Connect With UsVirtual Cyber Security Summit – DC Metro 2021The Eighth Annual DC Metro Cyber Security Summit goes virtual as it connects C-Suite &…Connect With UsMORE EVENTS
MORE BLOG POSTS
Enter submissions via the Bugcrowd platform, as you normally would. Our expert team of triagers…
Pen testing is widely known as a key security best practice. In fact, earlier this…
The Eighth Annual DC Metro Cyber Security Summit goes virtual as it connects C-Suite &…
Stay current with the latest security trends from Bugcrowd